Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 02:45

General

  • Target

    f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe

  • Size

    183KB

  • MD5

    87179f18e54469aea03570f9f070622e

  • SHA1

    4587b07d08776058f6584bb2b0324661e9441dbe

  • SHA256

    f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f

  • SHA512

    07239b807c872a00be07e69e30b716d362d3b51d137abf2dc355e00f93e25aef4aeada08f75694b51d32a4776e449738345112d09b5facf8b60718f551b0331d

  • SSDEEP

    3072:A8vh9nRFlQDvfQ2IE8DTVNIfdyMNxkWKXFevcfOLg8MOR2yVPpD+E9Al:A8bdQDvfQnbCkWKXF0Lg8UyVP5+

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe
    "C:\Users\Admin\AppData\Local\Temp\f5dbe6310db93ab4f7c5a8e11bedab47db6fd611fe392636f02cfa4b1109387f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      2⤵
        PID:2244

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1420-135-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/1420-137-0x0000000000A40000-0x0000000000AAC000-memory.dmp

      Filesize

      432KB

    • memory/1420-136-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/1420-138-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/1420-139-0x0000000000A40000-0x0000000000AAC000-memory.dmp

      Filesize

      432KB